Know and understand minimising the potential danger of using social media including knowing how to block and report unwanted users, an awareness of the potential dangers of meeting an online contact face to face, avoiding the distribution of inapprop

1. Hardware

  • Definition: Physical components that make up a computer system.
  • Core components

    • CPU (Central Processing Unit) – Executes instructions (e.g., Intel i5, AMD Ryzen 5).
    • Memory (RAM) – Stores data temporarily while programmes run (typical 4 GB–16 GB for students).
    • Primary storage – SSDs (fast, reliable) or HDDs (larger capacity, slower).
    • Secondary/portable storage – USB flash drives, external hard‑drives, SD cards, cloud storage.
    • Input devices – Keyboard, mouse, touch‑screen, scanner, microphone, webcam.
    • Output devices – Monitor, printer, speakers, projector.
    • Peripherals – Docking stations, VR headsets, game controllers.

  • Everyday examples

    • Smartphone – integrates CPU, RAM, SSD, touchscreen, camera, and wireless radios.
    • Interactive whiteboard – large display + touch sensor + built‑in PC.

2. Software

  • System software – Operating systems that manage hardware resources (Windows, macOS, Linux, Android, iOS).
  • Application software – Performs specific tasks:

    • Word processing (Microsoft Word, Google Docs)
    • Spreadsheets (Excel, Google Sheets)
    • Presentation software (PowerPoint, Prezi)
    • Database software (Microsoft Access, MySQL)
    • Web browsers (Chrome, Firefox, Edge)
    • Graphics editors (GIMP, Photoshop)
    • Multimedia players (VLC, Windows Media Player)

  • Utility software – Antivirus, backup tools, file‑compression (ZIP, RAR), disk‑defragmenters.
  • Software licensing

    • Free‑ware – free to use, often with limited features.
    • Share‑ware – free trial, then pay for full version.
    • Open‑source – source code available; can be modified (e.g., Linux).
    • Commercial – licence required, often with restrictions on copying.

3. Input, Output & Storage Devices

  • Input – Keyboard, mouse, touchpad, stylus, scanner, microphone, webcam.
  • Output – Monitor, printer, speakers, projector, headphones.
  • Storage

    • Primary: SSD, HDD.
    • Secondary: USB flash drive, external HDD/SSD, SD card.
    • Cloud: Google Drive, OneDrive, Dropbox (requires internet).

4. Networks

  • Types of networks

    • LAN (Local Area Network) – limited to a single building or campus (e.g., school computer lab).
    • WAN (Wide Area Network) – covers large geographic areas; the Internet is the largest WAN.
    • Wireless networks – Wi‑Fi (802.11ac/ax), Bluetooth, mobile data (3G/4G/5G).

  • Network topologies

    • Star – all devices connect to a central switch/router (most common).
    • Bus – devices share a single communication line (rare today).
    • Ring – each device connects to two neighbours, data travels in one direction.
    • Mesh – multiple paths between devices; high reliability (used in some campus Wi‑Fi).

  • Network hardware – Router, switch, modem, access point, network interface card (NIC), firewall appliance.
  • IP addressing

    • IPv4 – 32‑bit address (e.g., 192.168.1.10). Supports ~4.3 billion addresses.
    • IPv6 – 128‑bit address (e.g., 2001:0db8::1). Provides virtually unlimited addresses.

  • Basic network security

    • Firewalls – filter incoming/outgoing traffic.
    • Encryption – WPA2/WPA3 for Wi‑Fi, HTTPS for web traffic.
    • Strong passwords & 2FA for router admin accounts.

5. Effects of Using ICT

  • Positive effects

    • Improved communication – email, video‑calls, instant messaging.
    • Instant access to information – research, e‑learning platforms.
    • Automation of routine tasks – spreadsheets, macros, scheduling.
    • Economic growth – new jobs, e‑commerce.

  • Negative effects

    • Digital divide – unequal access to devices and broadband.
    • Health concerns – eye strain, poor posture, repetitive‑strain injury.
    • Environmental impact – e‑waste, energy consumption of data‑centres.
    • Social issues – cyber‑bullying, privacy loss, online addiction.
    • Security threats – malware, phishing, identity theft.

6. ICT Applications (selected examples)

SectorTypical ApplicationReal‑world example
EducationVirtual classrooms, LMS, digital assessmentGoogle Classroom delivering assignments
Businesse‑Commerce, POS, CRM, ERPOnline shop (Shopify) + inventory system
Banking & FinanceOnline banking, ATMs, fraud‑detection systemsATM cash‑withdrawal workflow
HealthTelemedicine, electronic patient recordsVideo consultation via NHS App
Governmente‑Government services, digital IDs, online tax filingHMRC online self‑assessment
RetailBarcode scanners, stock‑control, self‑checkoutSupermarket self‑service tills
TransportationGPS tracking, ticketing, traffic‑managementReal‑time bus arrival apps
EntertainmentStreaming, online gaming, digital publishingNetflix video‑on‑demand

7. Systems Development Life‑Cycle (SDLC)

  1. Planning

    • Define objectives, scope and feasibility (technical, economic, legal).
    • Produce a project brief and obtain stakeholder approval.

  2. Analysis

    • Gather user requirements (interviews, questionnaires, observation).
    • Create a requirements specification (functional & non‑functional).

  3. Design

    • Data‑flow diagrams (DFDs) and entity‑relationship diagrams (ERDs).
    • UI mock‑ups, screen layouts, navigation flow.
    • Choose hardware, software and network architecture.

  4. Implementation

    • Write or adapt code, configure hardware/software.
    • Data migration from legacy systems.
    • Choose an implementation method: direct change‑over, parallel, pilot or phased.

  5. Testing

    • Unit testing – individual components.
    • Integration testing – combined modules.
    • User‑acceptance testing (UAT) – real users verify requirements.
    • Document test results and fix defects.

  6. Deployment

    • Install system on live environment, train users, produce user manuals.
    • Perform a post‑implementation review.

  7. Maintenance

    • Corrective (bug fixes), adaptive (environment changes), perfective (enhancements), preventive (future‑proofing).
    • Regular backups, updates and security patches.

8. Safety and Security

8.1 Physical Safety

  • Keep cables tidy and away from walkways to avoid trips.
  • Never handle electrical devices with wet hands – risk of shock.
  • Use surge protectors for computers and peripherals.
  • Store laptops, tablets and phones in padded cases when transporting.

8.2 e‑Safety Checklist

  • Passwords – Minimum 12 characters, mix of upper‑/lower‑case, numbers, symbols; avoid dictionary words; use a password manager.
  • Two‑Factor Authentication (2FA) – Enable wherever possible (authenticator app or hardware token).
  • Malware protection – Install reputable anti‑virus/anti‑malware, keep signatures up‑to‑date, scan downloads before opening.
  • Phishing detection

    • Check sender’s email address for misspellings.
    • Hover over links to view the real URL.
    • Never provide personal or financial details in unsolicited messages.

  • Safe cloud use – Store non‑sensitive files; for confidential data use services with end‑to‑end encryption.
  • Backup strategy – Follow the 3‑2‑1 rule: three copies, two different media, one off‑site (e.g., external HDD + cloud).
  • Software updates – Enable automatic updates for OS, browsers and apps.
  • Wi‑Fi security – Use WPA3 (or WPA2) with a strong passphrase; change default router admin credentials.

8.3 Data‑Protection Legislation (Basic Overview)

LegislationKey RequirementRelevance to Students
General Data Protection Regulation (GDPR)Personal data must be processed lawfully, fairly and transparently; individuals have the right to access, correct and delete their data.Obtain consent before posting photos of classmates; delete data when no longer needed.
Data Protection Act 2018 (UK)Implements GDPR in the UK; adds specific provisions for children’s data.Same practical steps as GDPR; schools must have a clear privacy notice.
Children’s Online Privacy Protection Act (COPPA) – USRequires parental consent before collecting personal information from children under 13.Useful when using US‑based apps or games.

8.4 Copyright & Software Piracy

  • Copyright basics – Protects original literary, artistic, musical and software works.
  • Allowed uses – Private study, quotation (with attribution), and fair‑dealing for criticism or review.
  • Piracy – Downloading or sharing unauthorised copies of software, music, movies or games is illegal and can lead to fines.
  • Legal alternatives – Use open‑source software, Creative Commons‑licensed media, or purchase licences.

8.5 Blocking and Reporting Unwanted Users (Social Media)

  1. Identify the problem – Harassment, offensive content, suspicious links, or unwanted contact.
  2. Document evidence – Take screenshots, note dates/times and usernames.
  3. Block the user – Prevents them from seeing or contacting you.
  4. Report the user – Use the platform’s built‑in reporting tool; attach evidence and select the appropriate reason.
  5. Escalate if necessary – Inform a trusted adult, teacher or school‑IT officer; for serious threats contact local authorities.

8.6 Meeting an Online Contact Face‑to‑Face

  • Verify identity through a video call and ask for two forms of ID.
  • Choose a public, well‑lit location (café, library, school campus).
  • Tell a parent/guardian the exact time, place and contact details of the person you are meeting.
  • Arrange a check‑in: send a message before you leave and another after you return.
  • Never go alone – bring a friend or have an adult accompany you.
  • Keep personal devices charged and set to “offline” or “airplane mode” if you feel unsafe.

8.7 Distribution of Inappropriate Images

  • Think before you share – once an image is online it can be copied and re‑shared indefinitely.
  • Check platform policies – most sites prohibit nudity, hate symbols, graphic violence and personal data of others.
  • Use privacy settings – limit the audience to “Friends only” or specific groups.
  • If posted by mistake, delete the image immediately and ask anyone who received it to delete it as well.
  • Report illegal or harmful content to the platform and, if appropriate, to a trusted adult or the police.

8.8 Using Appropriate Language Online

  • Avoid profanity, slurs, threats, bullying or harassing language.
  • Remember tone can be mis‑interpreted – be clear, polite and concise.
  • Follow each platform’s community guidelines and code of conduct.
  • Report abusive language to protect yourself and others.

8.9 Protecting Personal Data (Quick Reference)

ActionReasonHow to Implement
Do not share others’ personal details without permissionPrevents identity theft and privacy breachesAsk for consent; use generic terms (“a friend”) if unsure.
Use strong, unique passwordsReduces risk of account compromiseCombine letters, numbers, symbols; change every 6‑12 months; store in a password manager.
Enable two‑factor authentication (2FA)Adds an extra security layerActivate in account settings; prefer authenticator apps over SMS.
Beware of phishing attemptsProtects against fraud and malwareCheck sender address, hover over links, verify URLs before clicking.
Delete or archive old posts containing personal infoLimits long‑term exposureReview timelines regularly; use “delete” or “archive” features.
Limit location sharingReduces risk of physical stalkingTurn off GPS for apps that don’t need it; avoid posting real‑time whereabouts.

9. Audience

  • Identify the audience – Age, prior knowledge, interests, cultural background, accessibility needs.
  • Purpose of the ICT product – Inform, persuade, entertain, instruct, or record.
  • Copyright considerations

    • Use only material you own, have permission for, or that is free‑to‑use (Creative Commons, public domain).
    • Always give appropriate credit (author, source, licence).

  • Tailoring content – Adjust language (formal vs. informal), layout (simple vs. complex), media (text, images, video) to suit the audience.

10. Communication

  • Email etiquette

    • Clear subject line.
    • Professional greeting (e.g., “Dear Mr Smith”).
    • Concise body, bullet points where appropriate.
    • Polite sign‑off (e.g., “Kind regards”).
    • Proofread for spelling, grammar and tone.

  • Internet safety – Do not share personal data, recognise spam, use HTTPS (padlock icon) for secure sites.
  • Evaluating online information

    • Check author credentials and institutional affiliation.
    • Look for recent publication dates.
    • Cross‑verify with at least two reliable sources.
    • Beware of bias and commercial intent.

  • Netiquette – Be polite, avoid ALL CAPS (shouting), respect others’ opinions, use proper punctuation.

11. File Management

  • Folder hierarchy – Logical structure (e.g., Year_2025/Science/Physics/Notes).
  • File‑naming conventions

    • Short, descriptive names; no spaces (use underscores or hyphens).
    • Include version numbers (v1, v2) and dates (YYYYMMDD).
    • Example: Report20250312v2.docx.

  • Common file types

    • Documents – .docx, .pdf, .odt
    • Spreadsheets – .xlsx, .csv, .ods
    • Presentations – .pptx, .odp
    • Images – .jpg, .png, .gif, .svg
    • Compressed – .zip, .rar
    • Audio/Video – .mp3, .mp4, .wav

  • Backing up files – Follow the 3‑2‑1 rule; schedule automatic backups where possible.

12. Images

  • Resolution – DPI (dots per inch) for print (300 DPI typical); 72 DPI for web.
  • Colour depth – 24‑bit (true colour) for most images; 8‑bit for simple graphics or icons.
  • File formats

    • JPEG – lossy compression, good for photographs.
    • PNG – lossless, supports transparency.
    • GIF – 256 colours, supports simple animation.
    • SVG – vector format, scalable without loss.

  • Basic editing – Crop, resize, adjust brightness/contrast, add captions, remove background.
  • Copyright – Use only images you have permission for; credit the creator; respect licences (e.g., Creative Commons).

13. Layout

  • Page setup – Margins (usually 2 cm), orientation (portrait/landscape), paper size (A4).
  • Using tables – Organise data, create forms, improve readability; keep headings bold.
  • Headers & footers – Include page numbers, document title, author name, date.
  • Columns and sections – Break text into manageable blocks; use section breaks for different formatting (e.g., landscape tables).

14. Styles

  • Purpose – Ensure consistency, speed up formatting, simplify global changes.
  • Common style types

    • Paragraph styles – Normal, Heading 1, Heading 2, Quote.
    • Character styles – Emphasis, Strong, Code.
    • List styles – Bulleted, Numbered, Multi‑level.

  • Applying & modifying – Select text → choose a style; to change all instances, modify the style definition.

15. Proofreading

  • Run built‑in spell‑check and grammar tools.
  • Read the document aloud to catch missing words or awkward phrasing.
  • Check consistency of fonts, sizes, headings and spacing.
  • Verify facts, dates, calculations and citations.
  • Ask a peer or teacher to review for a fresh perspective.

16. Graphs & Charts

  1. Select data – Ensure accuracy and relevance.
  2. Choose appropriate type

    • Bar chart – compare categories.
    • Line graph – show trends over time.
    • Pie chart – illustrate parts of a whole.
    • Scatter plot – display relationship between two variables.
    • Histogram – frequency distribution.

  3. Label axes – Include units (e.g., “Temperature (°C)”).
  4. Add title and legend – Make the chart self‑explanatory.
  5. Format for clarity – Use contrasting colours, avoid 3‑D effects, keep gridlines subtle.
  6. Interpretation – Write a brief caption explaining the key trend or finding.

17. Document Production

  • Start with a suitable template (letter, report, flyer, brochure).
  • Set up page layout, margins and styles before adding content.
  • Insert objects – images, tables, charts, hyperlinks, footnotes.
  • Apply consistent heading hierarchy and paragraph styles.
  • Use the “Review” pane for spell‑check, track changes and comments.
  • Finalise with print preview, check pagination, and export as PDF for sharing.

18. Databases

  • Key concepts

    • Table – rows (records) and columns (fields).
    • Primary key – unique identifier for each record.
    • Field types – Text, Number, Date/Time, Currency, Yes/No.
    • Relationships – one‑to‑one, one‑to‑many, many‑to‑many.

  • Creating a simple database (e.g., Microsoft Access)

    1. Define table structure – set field names, data types and primary key.
    2. Enter data manually or import from a CSV file.
    3. Create forms for data entry – user‑friendly layout.
    4. Build queries to retrieve specific information (SELECT, WHERE, ORDER BY).
    5. Generate reports – group, sort and summarise data.

  • Common SQL commands (for GCSE level)

    • SELECT column1, column2 FROM table WHERE condition;
    • INSERT INTO table (col1, col2) VALUES (val1, val2);
    • UPDATE table SET column = value WHERE condition;
    • DELETE FROM table WHERE condition;

19. Presentations

  • Structure – Title slide, agenda, main points (3–5), summary, Q&A.
  • Design principles

    • Keep slides uncluttered – max 6 lines per slide, 6 words per line.
    • Use high‑contrast colour schemes; avoid busy backgrounds.
    • Consistent fonts (sans‑serif for readability) and sizes.
    • Include relevant images, charts or diagrams to support points.

  • Delivery tips – Speak clearly, maintain eye contact, use a remote clicker, rehearse timing.
  • Technical checks – Test projector/monitor, ensure media files play, have a backup copy on a USB drive.

20. Spreadsheets

  • Core functions – SUM, AVERAGE, COUNT, MIN, MAX.
  • Formulas – Use cell references (A1, B2) and operators (+, –, *, /).
  • Data analysis tools

    • Sorting and filtering.
    • Conditional formatting – highlight values that meet criteria.
    • Pivot tables – summarise large data sets.
    • Charts – bar, line, pie, scatter directly from data ranges.

  • Best practice

    • Label columns and rows clearly.
    • Keep raw data separate from calculations.
    • Use named ranges for readability.
    • Protect cells that contain formulas to avoid accidental changes.

21. Website Authoring

  • Basic HTML structure

    <!DOCTYPE html>

    <html lang="en">

    <head>

    <meta charset="UTF-8">

    <title>My Page</title>

    <link rel="stylesheet" href="styles.css">

    </head>

    <body>

    <h1>Welcome</h1>

    <p>Your content here.</p>

    </body>

    </html>

  • CSS basics

    body {font-family: Arial, sans-serif; line-height: 1.5;}

    h1 {color: #2A7AE2;}

    p {margin-bottom: 1em;}

  • Accessibility checklist

    • Provide alt text for images.
    • Use sufficient colour contrast (≥4.5:1).
    • Ensure navigation is possible via keyboard.
    • Use semantic HTML tags (header, nav, main, footer).

  • Publishing – Upload files via FTP or a web‑hosting control panel; test on multiple browsers (Chrome, Firefox, Edge) and devices (desktop, tablet, phone).
  • Legal considerations – Include a privacy notice, cookie disclaimer (if applicable), and respect copyright for all media used.